
Chapter 5 Digital Security Ethics and Privacy
Authored by Jocel Lagnason
Computers
University
Used 337+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
34 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Any event or action that could cause a loss of or damage to computer or mobile device hardware or software
Cybercriminal
Digital security risk
Green computing
Online perpetrators
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Online or internet based illegal acts such as distributing malicious software or committing identity theft
Cybercrime
Hacker
Online perpetrator
Script kiddie
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Someone who access a computer or network illegally
Cybercriminals
Cyberextortionist
Hacker
Trojan horse
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Hacker that uses prewritten hacking and cracking programs to break into computers and networks
Corporate spy
Cracker
Hacker
Script kiddie
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Someone who demands payment to stop an attack on an organization’s technology infrastructure
Cybercriminals
Cyberextortionist
Hacker
Script kiddie
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices
Adware
Malware
Virus
Worms
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Potentially damaging program that affects, or infects, a computer or mobile devices negatively by altering the way the computer or device works without the user’s knowledge or permission
Botnet
Spyware
Virus
Worms
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?